General
-
Target
View.bin
-
Size
170KB
-
Sample
220330-pbskksbhh6
-
MD5
f1a98f35102de03ade78f77b4d32672c
-
SHA1
7c10c2784119e89e71ef22900ded48cfaaef7401
-
SHA256
7526ce309a80adea50423093cb6bba5c13ee1a3b9e6b4317e6c7f02569aa48cd
-
SHA512
9a51ddc114286946d823ac36af7b4f56307123d152854e1410d263bae3f7c7b520286b193901710f6be5bc9380e2d1ad79dea2060a8211d5dc006392fb6bc667
Static task
static1
Behavioral task
behavioral1
Sample
View.exe
Resource
win7-20220311-en
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot5129491049:AAGZg7k4x6u8-480mf720NsRw6rJyhab7V0/sendMessage?chat_id=1002475102
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
View.bin
-
Size
170KB
-
MD5
f1a98f35102de03ade78f77b4d32672c
-
SHA1
7c10c2784119e89e71ef22900ded48cfaaef7401
-
SHA256
7526ce309a80adea50423093cb6bba5c13ee1a3b9e6b4317e6c7f02569aa48cd
-
SHA512
9a51ddc114286946d823ac36af7b4f56307123d152854e1410d263bae3f7c7b520286b193901710f6be5bc9380e2d1ad79dea2060a8211d5dc006392fb6bc667
-
StormKitty Payload
-
suricata: ET MALWARE StormKitty Data Exfil via Telegram
suricata: ET MALWARE StormKitty Data Exfil via Telegram
-
Async RAT payload
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-